@3empty - we will make sure we keep you posted. Thanks for the info.

Taylor

On Tue, Feb 17, 2009 at 11:54 AM, 3mpty <[email protected]> wrote:

> > Target address range is 0x22000000 to 0x2203fff (SRAM)
>
> The second number is 0x22003FFF or 0x2203FFF0? A digit is missing (am I
> wrong?)
>
> Well, there's a problem if the address start with 0x2200 because,
> yeah, this is the code for "... and this will stop the parsing of the
> link and so the shellcode doesn't get copied into memory and won't
> cause the overflow (even if I'm not sure of this).
> An alternative solution could be to find some place in the memory
> where there's a branch instruction to this location and place its
> address in the payload of the exploit, but I don't think we'll ever
> find an instruction of that kind (Jump into stack isn't common).
>
> Also, can someone report what was written on IRC for people like me
> that weren't connected? Thank you.
>
> Paolo
>
> _______________________________________________
> Linux4nano-dev mailing list
> [email protected]
> https://mail.gna.org/listinfo/linux4nano-dev
> http://www.linux4nano.org
>
_______________________________________________
Linux4nano-dev mailing list
[email protected]
https://mail.gna.org/listinfo/linux4nano-dev
http://www.linux4nano.org

Reply via email to